• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

U.S. Department of Transportation wants carmakers to focus on cyber security

October 27, 2016 by Ioannis S. Haviaras 2 Comments

The NHSTA (National Highway Traffic Safety Administration) has recommended that a set of guidelines titled “Cybersecurity Best Practices for Modern Vehicles” be followed by every automaker. Even though it is not mandatory many people in Washington believe that this should be a mandatory guideline. Since vehicles are becoming more autonomous and the technology inside vehicles are becoming more sophisticated these guidelines should be followed to prevent any unwanted individuals from obtaining sensitive information. These guidelines provide recommendations on wireless interfaces, internal vehicle communications, network ports, protocols, and access to firmware. BMW and Tesla have reported security issues in the past and have been striving to make their cars as safe as possible. Information such as someone’s location, driving habits and even PII can be compromised from a vehicle.

Article: http://www.digitaltrends.com/cars/nhtsa-auto-cyber-security-guidelines/

Filed Under: Week 10: Web Application Hacking Tagged With:

Reader Interactions

Comments

  1. Ahmed A. Alkaysi says

    October 31, 2016 at 10:15 am

    I think these guidelines should definitely be mandatory. As cars and the world get more connected, cyber security needs to be on the forefront. I wouldn’t be surprised if we start seeing “hacking” among the leading cause of car deaths within the next 20 years. Before we allow this to happen, the car companies need to do everything in their power to make sure their network infrastructure is secured. These guidelines can help achieve that.

    Log in to Reply
  2. Mauchel Barthelemy says

    November 5, 2016 at 9:21 am

    Great article Ioannis. This cyber security’s are of focus has been long overdue. In order to make cyber security Best Practices for Modern Vehicles’ laws and regulations successful, they must be tied to drivers’ safety. You mention that “Information such as someone’s location, driving habits and even PII can be compromised from a vehicle.” Additionally, if not the most important of them all, drivers’ safety poses greater risks. It looks like motor vehicles are being equipped with more technologies than ever and autonomous car is projected to become the new norm; therefore, hacking such systems for example could give attackers control of causing sudden stops anywhere.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in